the Effectiveness of Migration-based Load

Size: px
Start display at page:

Download "the Effectiveness of Migration-based Load"

Transcription

1 On the Effectiveness of Migration-based Load Balancing Strategies in DHT Systems Di Wu, Ye Tian and Kam-Wing Ng Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong {dwu, ytian, date, most proposals of the above two strategies are validated by simulation. There lacks theoretical analysis to compare their effectiveness in PP environments, which are highly dynamic, in large scale and with malicious peers. In this paper, we analytically study the effectiveness of RDS and ISS in terms of their efficiency, scalability and robustness. We find that, in spite of the stale information caused by system churn, RDS is still more efficient than ISS in most situations. RDS can lead to a more balanced system state, except that its convergence time will become longer when the churn rate is high. The main drawbacks of RDS are its scalability and vulnerability. Contrary to RDS, ISS has good scalability and robustness. Based on the analysis results, we also propose a new load balancing strategy for DHT-based PP systems, called GossipI. INTRODUCTION Based Strategy (GBS), which is scalable and achieves both The importance of load balancing in DHT-based Peer-to- the efficiency of RDS and the robustness of ISS. In GBS, Peer systems has motivated a number of proposals, e.g., [], the whole system is formed into groups, and the gossip [], [3], [4], [5], etc. Many of them are based on the concept of protocol is used for load information dissemination within "virtual server". Similar to a physical peer, a virtual server is the group. After load information dissemination, every group also responsible for a contiguous range of the DHT identifier member has the full load information of its own group and space, but one physical peer can host multiple virtual servers. the utilization information of the whole system. Thus, each Due to the limitation of pure namespace balancing, virtual group member can act as the rendezvous directory to perform servers are allowed to migrate between nodes. By shedding load reassignment within the group, but the position of the an appropriate number of virtual servers from heavy nodes rendezvous directory is randomized to make GBS resistant to to light nodes, load balancing can be achieved. Based on the node-targeted attacks. Besides intra-group load balancing, the difference in load information management and decision inter-group load balancing and emergent load balancing are making of load balancing, the existing migration-based ap- also allowed in GBS to achieve a more balanced system state. proaches can be categorized into two representative strategies: Finally, simulation-based study is performed to validate the () Rendezvous Directory Strategy (RDS) and () Independent effectiveness of GBS. Searching Strategy (ISS). The remainder of this paper is structured as follows. We In RDS, the load information of each peer is periodically first introduce the related work in Sec. II. The modeling and published to the rendezvous directory, which can be a central analysis are presented in Sec. III. In Sec. IV, we propose and entity, or organized in a distributed fashion (e.g., tree structure analyze a new approach of load balancing - GBS. Finally, Sec. in [5]). The rendezvous directory is responsible for scheduling V summarizes the whole paper. the load reassignment to achieve load balance. However, the II. RELATED WORK system churn may cause the problem of stale information, In DHT-based PP systems, much research work about and hurt the performance of RDS. In ISS, the node doesn't publish its load information anywhere else, and only provides load balancing is based on namespace balancing. Namespace its load information upon request. To achieve load balancing, balancing is trying to balance the load across nodes by ensura node should perform searching (or sampling) independently ing that each node is responsible for a balanced namespace to find other nodes with inverse load characteristics, and then (e.g, [6], [], etc). It is valid only under the assumption of migrate the load from the heavy node to the light node. To uniform workload distribution and uniform node capacity. For Abstract- As a fundamental problem in DHT-based PP systems, load balancing is important to avoid performance degradation and guarantee system fairness. In this paper, to get a better understanding about the effectiveness of migration-based load balancing approaches in DHT systems, we analytically study two representative migration-based load balancing strategies: Rendezvous Directory Strategy (RDS) and Independent Searching Strategy (ISS). They differ in load information management and decision making in the process of load balancing. We analyze their performance in terms of efficiency, scalability and robustness, and explore the impact of their parameter settings. Based on the analysis results, we also propose a Gossip-Based Strategy (GBS) for load balancing in DHT systems, which attempts to achieve the benefits of both RDS and ISS. Later, the effectiveness of GBS is evaluated by simulation under different workload and churn /6/$. 6 IEEE 45

2 a better balancing effect, "Virtual Server" was introduced in Chord. By letting each node host multiple virtual servers, the O(logN) imbalance factor between nodes can be mitigated. If considering the node heterogeneity, virtual servers can be allocated proportional to node capacity (e.g., CFS [7]). In case that a node is overloaded, the node simply removes some of its virtual servers. However, such simple deletion will cause the problem of "load thrashing", for the removed virtual servers may make other nodes overloaded. Simply by pure namespace balancing, it is hard to handle workload skewness well. A more general approach is the migration-based approach, which is applicable to various kinds of scenarios and able to handle workload skewness. A number of migration-based approaches have been proposed to date (e.g., [3], [4], [5], etc). Most of them are based on the concept of virtual servers. In [3], Rao et al. proposed three simple load balancing schemes: "one-to-one", "one-to-many" and "many-to-many". Among them, "one-to-many" and "many-to-many" belong to the RDS category, while "one-to-one" belongs to the ISS category. To enable emergent load balancing, Godfrey et al. [4] make a combination of "one-to-many" and "many-to-many" and use them in different scenarios. The scheme proposed in [5] also belongs to the RDS category, but its rendezvous directory is organized as a distributed k-ary tree embedded in the DHT. Although load migration is well studied in the field of traditional distributed systems, there is few analytical work to study its effectiveness in the PP system, which is different from traditional distributed systems in its dynamics, large scale and node characteristics. That is the motivation of our work. And our proposed Gossip-Based Strategy (GBS) differs from the previous work in that, we take robustness into account besides efficiency and scalability. III. MODELING AND ANALYSIS A. System Model Our analysis is conducted under the steady state. To better measure the effect of load balancing algorithms, it is assumed that there is no workload shift and the load on peers will not change unless being altered by the load balancing process. To model the system dynamics (also referred to as "system churn"), each peer is associated with a lifetime L when first joining the system. A peer leaves the system when its lifetime is exhausted. The peer lifetime L is assumed to follow a certain distribution. Based on the measurement results in [8], we adopt the Pareto lifetime distribution in our analysis, in which the CDF is given by F(=) -( +.)-a. Based on the ratio between the node utilization and the system utilization, the nodes can be classified into three types, i.e., light node, heavy node and normal node. During load balancing, only light nodes and heavy nodes participate the load reassignment. For simplicity, the balancing between one light node and one heavy node is assumed to result in two normal nodes. This assumption can also be relaxed by introducing a probability for different balancing results. The percentage of imbalanced nodes (including both light and heavy nodes) PIB is adopted as the metric to indicate the system imbalance degree. Let h(t) and l(t) be the number of heavy nodes and light nodes alive in the system at time t, then the percentage of the imbalanced nodes at time t can be represented by PIB (t) = h(t)+l(t), where N is the system size under the steady state. A good load balancing algorithm should be able to minimize PIB as much as possible, and as quickly as possible. It is important for avoiding the performance loss due to the load imbalance. With the elapse of time, there exists a time point Tg, when t > Tg, PIB (t) can not be further minimized any more. Here, Tg is called the "Convergence Time". Tg together with the percentage of imbalanced nodes at that time PIB (T9) reflect the efficiency of load balancing algorithms. In the following sections, besides efficiency, we also analyze the scalability and robustness of RDS and ISS. B. Rendezvous Directory Strategy (RDS) In RDS, every node updates its load status in a period of Tt, to the rendezvous directory. The process of load balancing is executed periodically, and the period is denoted as Tlb. Let ti be the time of the i-th load balancing action, ti+l = ti + Tlb, (i =,,...). Note that Tlb and Tt, are not required to be the same, but we often set Tlb > Tt, for it is unnecessary to perform multiple times of load balancing actions within one update period. A peer makes its first update when joining the system, and sends updates periodically within its lifetime. The joining time of peers may be different, but their update period is the same. If there is no system churn, every peer will make exactly one update within any duration of T,. In the basic RDS, the peer set for balancing includes all the nodes that make updates within one load balancing period Tlb. However, there exist some peers that may leave after making updates within the period Tlb. For this portion of peers, we call them 'faked" live peers. As from the view of the rendezvous directory, they are still being taken as live peers and paired with other peers. This will result in the failure of some assigned load transfers and impact the effectiveness of RDS. For distinction, the peers that are really alive at the time of load balancing are called "real" live peers. By applying the theory of stochastic process, we have the following result: Theorem : In the basic RDS, given the update period Tt, and the load balancing period Tlb, the probability that a peer is a "real" live peer in the peer set for balancing at the rendezvous directory is Preal cttb±( 3 [(I+T-)---] for Pareto lifetime distribution with a >. 3 >. U Proof: Please refer to our technical report [9]. During load balancing, only when the load movement happens between two "real" live peers can the movement be successful. Let Psucc be the probability that a pair (heavy node, light node) can be a successful pair, then we have Psucc = P(heavy node is alive, light node is alive) = Peal Let h'(ti+i) and l'(ti+,) be the number of heavy nodes and light nodes in the peer set for balancing at time ti+l (including both faked and real live peers). Denote Np(t) as 46

3 the number of effective pairs that can be successfully executed during load balancing at time t. Then for the (i + I)-th round of load balancing at time ti+l, we have: Np(ti+,) min{h'(tj±i), '(tji) xp}xsucc = min Pealt,Pral real I (ti ) } x Preal*After a load balancing action, the changes of heavy nodes and light nodes are provided by h(ti+) = h(ti)np(ti+) and l(tj±) = l(ti) -Np (ti+l). Given the initial number of heavy nodes and light nodes, we can compute the convergence time Tg and the percentage of imbalanced nodes at the convergence time PIB(Tg) via the above iterative relation. In Sec. III-D, we will perform numerical study on the two metrics. To reduce the number of 'faked" live peers further, we can make enhancement to the basic RDS. It is possible to only consider the peers that make updates within the last period of Tu before the load balancing action. If a peer is alive at ti+l, it has surely made an update within the duration (ti+i- Tu, ti+i]. For the enhanced RDS, we have the following theorem. Theorem : In the enhanced RDS, given the update period Tu and the load balancing period Tlb, the probability that a peer is a "real" live peer in the peer set for balancing at the rendezvous directory is Preal a-- [(+ T- )-- -] ( for Pareto lifetime distribution with a >, X >. Proof: Please refer to our technical report [9]. X We proceed to consider the scalability of RDS, which mainly depends on the capacity of the rendezvous directory. In a system with N nodes, the traffic of update messages is WRDS = O( N). It is hard for single rendezvous directory to support too many peers. To improve its scalability, a natural approach is to use multiple nodes to support the rendezvous directory service, e.g., to designate multiple peers by hashing [3] or using distributed structures (e.g., [5]). The robustness is another issue. We find that, RDS is vulnerable to the node-targeted attacks. In existing proposals (e.g., [4], [5]), the positions of rendezvous directories are static and public known to all the peers. By overwhelming the rendezvous directory, malicious peers can block update messages. What is more, in case that the rendezvous directories are occupied by attackers, the service of load balancing will be totally brought down. Tnin{h (ti ), ) C. Independent Searching Strategy In ISS, the nodes depend on searching to find the nodes with inverse load characteristics, and then form into pairs for load transfer. Either light or heavy nodes can initiate the searching. Here we consider the scenario where light nodes are the search initiators, in order to avoid the phenomenon of "thrashing". Searching can be seen as a kind of sampling here. Within each time interval, we assume that each peer can sample k addresses. In case that multiple peers perform sampling simultaneously, the sample sets of different peers may be overlapped. Under the worst case, they have the same sample set. Here, we only consider the best situation and suppose that there exists an ideal sampling service that could make the sample sets of peers as independent as possible. For ISS, our results are as follows: Theorem 3: For ISS, supposing that each peer can sample k addresses per time interval, then the number of load balancing pairs formed within [t, t + ) under the best situation is Np(t) =min{h(t), [ -( N-t)) 3+(e - ) x I(t)}, where s is the average time for node replacement in case of failure. Proof: Please refer to our technical report [9]. U Based on the above theorem, we have a similar iterative relation as Sec. III-B, with which we can compute the convergence time Tg and PIB(Tg) of ISS: h(t + ) = h(t)np(t) and I(t + ) = I(t) -Np(t). The numerical results are presented in Sec. III-D. For ISS, the scalability depends on whether the participating peer can tolerate the message traffic towards it. If DHT lookup is used as the sampling service, based on the results from [] and assuming the underlying DHT to be Chord, the message traffic that a peer experiences per interval is given as WISS < N Ng N-N±l N O(logN); if k-random walk is adopted as the sampling method instead and assuming the traffic is distributed equally to all nodes, the message traffic for a peer per interval WISS < k. Under both situations, ISS exhibits good scalability. Compared with RDS, the robustness of ISS is rather good. There is no server-like entity in the system and the responsibility is dispersed to all the peers, thus ISS is less vulnerable to the node-targeted attacks. D. Numerical Study In this section, we perform numerical study about the efficiency of RDS and ISS under churn based on the theorems in the previous section. o-, Y, - Si.5.5 E ~ -..r ~~~~~~~~T '~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~P6(Tg)3 m o- t.5 t t pib(t9) 4 Tg 6 Expected Lifetime E[L] (hr) (a) 8.5 (b) Fig.. Impact of System Churn on Load Balancing Strategies under Pareto Lifetime Distribution: (a) Impact to RDS; (b) Impact to ISS In Fig., we study the impact of system churn on both load balancing strategies. From Fig., we find that, regardless of the system churn level, the percentage of imbalanced nodes at the convergence time PIB (Tg) in RDS is always much smaller than ISS. It means that, RDS can lead to a more balanced state compared with ISS. The underlying reason is that, it becomes hard to find a heavy node in ISS when there are only a few heavy nodes left in the system. The convergence time Tg of RDS is rather good except under very high-churn environment 47

4 ~~-RDS Enhanced RDS s 5 Enhanced RDS s.6.5 E o) - RDS Load Balancing Period Tib (hr) (a) Impact of Tlb \=.4.8 '. o = Update Period T. (hr) (b) Impact of T,, 64. T \s3t I4 _ 8 Sample Size k 4 6 Sz. (c) Impact of Sample Size k Fig.. Impact of System Parameters: (a) Impact of Tlb to RDS; (b) Impact of Tl, to RDS; (c) Impact of Sample Size k on ISS (e.g., E[L] < 5 mins). However, such high churn hasn't been A. Gossip-based Load Information Dissemination and Aggreobserved in the existing deployed PP systems. gation In Fig., we plot the impact of system parameters. Fig. (a) GBS is built on top of ring-like DHTs, such as Chord, shows the impact of load balancing period Tlb to RDS and etc. Based on the system size, one or more load balancing its enhancement. With the increasing of Tlb, the convergence groups are formed among peers. For systems with only a few time Tg increases almost linearly. Compared with the basic thousands of peers, only one group is formed; but for systems RDS, the enhanced RDS has a smaller convergence time. It is because that, the number of 'faked" live peers is reduced with hundreds of thousands of peers, the peers form into multiple groups, each of which corresponds to a continuous in the enhanced RDS. For different Tlb, we also find that region with equal size in the ring. All the peers within the the percentage of imbalanced nodes at the convergence time same group share the same prefix, which is referred to as the PIB(Tg) is almost the same. "GroupID". The impact of the update period TX, is illustrated in Fig. In GBS, instead of reporting to a fixed rendezvous directory, (b). Compared with Tlb, the impact of Tt, adjustment is not each node disseminates its load information within the group obvious. For the basic RDS, it is interesting to observe that the by gossip protocol. Here, to reduce the message traffic, a convergence time Tg becomes longer when TX, uses a smaller gossip "tree" embedded in the DHT is used for information value. When Tt, is small, it is easier for one peer to make an dissemination. This tree doesn't require explicit maintenance update within Tlb before leaving. For the enhanced RDS, we and just expands based on local information. If a node wants to can see that Tg becomes smaller when the update period Tt, is disseminate its load information, it will send the information to smaller. The reason is that only the updates in the last update all the peers with the same GroupID in its routing table. Next, period will be considered. With a smaller T,, less 'faked" live when an intermediate node Ni receives the message from the peers will be taken into account. In our result, PIB (Tg) is also node the one who has already received the information, Ni-, observed to be almost the same for different T,. Ni only forwards the message to every node Ni+ in its For ISS, the only tuning parameter is the sample size k and routing table satisfying prefix(ni, Ni+ ) >prefix(ni, Ni_ ). its effect is illustrated in Fig. (c). With the increasing of k, the Here, prefix(x, y) is defined as the maximum common prefix convergence time Tg and the percentage of imbalanced nodes between the node x and y. at the convergence time PIB (Tg) will decrease accordingly. The load information of a node N to be published includes: However, the decreasing speed will become slower when k is () the node's capacity; () the load of all the virtual servers bigger. We also find that, even by using a big sample size (k = hosted by the node; (3) the node's ip address. For a small ), PIB (Tg) is still much higher than what RDS can achieve. system with only one group, the load information of each peer The efficiency of ISS can only be improved in a limited degree can be delivered quickly to all members within a short period. by increasing k. After that, each peer has the load information of all other Overall, even considering the impact of system churn, RDS peers. is still more efficient than ISS in most situations. The main In case of a large system, there exist multiple groups. Each problems of RDS are its scalability and robustness. node N should run at least two virtual servers. Among them, one virtual server N is with the identifier id, generated by hashing the node's IP; and another virtual server N is with IV. GOSSIP-BASED LOAD BALANCING STRATEGY the identifier id generated by hashing id,. N is called the primary server of node N; and N is called the secondary In this section, we propose a Gossip-Based Strategy (GBS) server of node N. During load reassignment, these two virtual for load balancing in DHT systems. The objective of our servers can't be moved to other nodes, but their size can be design is to exploit the efficiency of RDS while improving changed. Given two arbitrary groups, the probability that there exists at least one node N whose primary server N is in one its scalability and robustness at the same time. 48

5 group and secondary server N belongs to another group is given by e C-c [], where c is the ratio between the group size and the number of groups. With c= 5, the probability is as high as.993. It implies that, for any group, it is with high probability that there exists a secondary server of its group members in any other group. It provides us with an opportunity to aggregate load information of other groups and calculate the system utilization, which is important to achieve the systemwide load balance. Through gossiping in each group, for a given node N, it can have the full load information of at least two groups: the group S, where its primary server N is in; and the group T, where its secondary server N is in. To let other group members in the group S learn the load status of the group T, the node N also propagates the information about the average load level and the node number of the group T within the group S by piggybacking with its own load information. For the secondary servers of the group members in the group S exist in almost all other groups, after gossiping, every member in the group S learns the load status of all other groups, and is able to estimate the system-wide utilization independently. B. Intra-Group Load Balancing After load information dissemination, every member within a group holds the load information of the full group and the system-wide utilization information. Each group member has the capability to act as the rendezvous directory to classify the nodes and schedule load reassignment in the group. However, in order to be robust to the node-targeted attacks, we should randomize the position of the rendezvous directory for each load-balancing round. Although some sophisticated randomization algorithms and security mechanisms can be used to make the position selection be more secure, we adopt a simple but effective approach. It is based on the assumption that, the node-targeted attack is often costly and the probability to compromise a node within a short period is small. The idea of our approach is as follows: we associate the round of load balancing with a sequence number seqlb, which is known by all group members. seqlb will be increased by every load balancing round. In each round, every node locally generates a random key by hashing seqlb with a common hashing function. The prefix of a generated key should be replaced by GroupID to guarantee the node responsible for the key exists within the group. The node that hosts that key is selected as the rendezvous directory. After the completion of load balancing, the node increases seqlb by one and disseminates the value to all members for consistency checking of seqlb. In the next round, another node will be chosen as the rendezvous directory due to the randomness of hashing function. So even if the current rendezvous directory is compromised, the service of load balancing can quickly be recovered. As there is no fixed rendezvous directory in the group, GBS is more robust than RDS to the node-targeted attack. As the problem of computing an optimal reassignment of virtual servers between heavy nodes and light nodes is NP- complete, a simple greedy algorithm similar to [4] is adopted here to perform the virtual server reassignments. C. Inter-Group and Emergent Load Balancing Inter-group load balancing is performed only when there exist multiple groups in the system. For the distribution of light nodes and heavy nodes may be various in different groups, it is possible that even after intra-group load balancing, some groups still have many light nodes, while other groups have many heavy nodes. To handle this situation, inter-group load balancing is allowed. In a group S with many heavy nodes, its average utilization is higher than the average utilization of the whole system. Suppose that the node N is the current rendezvous directory of the group S, due to load information dissemination, the node N has the full load information of its own group and the load status of all other groups with high probability. The node N can select one group with the most amount of free capacity to perform inter-group load balancing. The process is as follows: Given the inter-group load balancing to be performed between the group S and the group T, the rendezvous directory N of the group S first finds another node N' within the group S whose secondary server exists in the group T, and then transfers the responsibility to N'. Since N' has the full load information of both the group S and the group T, it can perform the best-fit load reassignment among the nodes of the two groups. With inter-group load balancing, a system-wide balanced state can be achieved. GBS can also provide emergent load balancing. In case that the utilization of one heavy node is beyond a threshold, it can directly contact the lightest node within its group; if there exist no light nodes in its own group, based on collected load information of other groups, it selects the group with the most amount of free capacity and sends a request to one random node in that group, which will return a light node to relieve its load. D. Performance Analysis GBS is conceptually similar to RDS, therefore, their efficiency should be comparable. The main concern is the scalability of GBS. Let g be the group size. In small or medium-size systems, g = O(n); in large systems, the ratio between the group size and the group number c is adjusted to make g = (n), however, the value of c cannot be too small in order to guarantee efficient information dissemination between groups. In the evolution process of the system, the groups are split only when the size of the current group is over a threshold. The update traffic that a peer experiences per interval is WGBS O(g). Given T,, = 3 seconds, n = 5,, c = 4 and message size = 3 bytes, WGBS is about 5k bytes/sec for normal peers. The traffic is rather low and tolerable even for the low-bandwidth users. The robustness of GBS is greatly improved compared with RDS. By gossip-based information dissemination, it is hard for 49

6 malicious peers to block the update messages. The randomization of rendezvous directories enables GBS resistant to the node-targeted attacks. E. Experimental Evaluation We evaluate the performance of GBS on top of a Chord simulator, which is enhanced to support virtual servers. Synthetic traces are generated to simulate the system churn. In the experiment, the node capacity follows a Gnutella-like distribution, and the average node capacity is able to serve requests per second. Initially, each node is assigned 5 virtual servers. Similar to [5], we also assume the size of a virtual server satisfies exponential distribution. The update period and the load balancing period is set as 3 and 8 seconds respectively. The workload is generated by the requests from all the nodes uniformly, but the destinations are chosen from either uniform or Zipf distribution. To serve a request will put one unit of load on the destination node. In case that a request is served by an overloaded node, the request is called as the "ill request". We run the simulation for a rather long period, and take the average percentage of "ill requests" among all the requests as the metric to evaluate the effectiveness of different load balancing algorithms. For comparison, we also simulate another four strategies: () Rendezvous Directory Strategy (RDS); () Independent Searching Strategy (ISS); (3) Proportion strategy: the nodes remove or add virtual servers to make the load proportional to their capacity; (4) No load balancing for the system. Fig. 3 plots the effects of load balancing strategies under different degrees of workload. Under the uniform workload, Proportion, ISS, RDS and GBS can all guarantee a low percentage of ill requests even with a high request rate. GBS is slightly worse than RDS, but outperforms ISS and Proportion. Under the skewed workload, all the strategies perform worse, but GBS and RDS still can retain a low percentage of ill requests. The reason is that, both GBS and RDS can utilize the global information to achieve a more balanced system state. %- No LB -E- Proportion 9% can always lead to a more balanced system state and minimize the percentage of ill requests. But GBS and RDS perform slightly worse when the churn rate is higher. The reason is that, a high churn rate will increase the convergence time to the balanced state, which will cause the increase of ill requests accordingly. However, the impact is slight to the efficiency GBS and RDS. The above results also correlate well with our analytical results in Sec. III. 9% (a) Uniform '- =)4%- =)4%- (3% o3 /T ( < Average Peer Lifetime (hr) % 3 Average Peer Lifetime (hr) 4 (b) Skewed V. CONCLUSION In this paper, we have studied the effectiveness of two representative load balancing strategies in DHT-based PP systems: Rendezvous Directory Strategy (RDS) and Independent Searching Strategy (ISS). Through a simple analytical model, we analyzed their efficiency, scalability and robustness. Later, we proposed a Gossip-Based Strategy (GBS) for load balancing in DHT systems, which achieves both the efficiency of RDS and the robustness of ISS. 6) % Request rate GDS 6% O5% In summary, we find that GBS can achieve almost the same efficiency as RDS. But different from RDS, GBS also achieves scalability and robustness at the same time. No LB -E- Proportion/ RDS Fig. 4. Percentage of ill requests under different churn rates (a) Uniform workload; (b) Skewed workload (zipf distribution with parameter.). 4% Request rate Proportion 7% (a) Uniform /o- ( - No LB 8% O5% =)4% (>3% 9% S % R GDS/ X D X% 7 5% MO5% R 8/ _6%- %) egds/) - No LB El Proportion 9% z (b) Skewed Fig. 3. Percentage of ill requests under different degrees of workload (a) Uniform workload; (b) Skewed workload (zipf distribution with parameter.). In Fig. 4, we examine how the churn impacts the load balancing strategies by varying the average peer lifetime. It can be observed that, under both uniform and skewed workload, compared with ISS and Proportion, GBS and RDS 4 REFERENCES [] J. Byers, J. Considine, and M. Mitzenmacher, "Simple load balancing for distributed hash tables," in Proc. IPTPS'3, 3. [] M. Naor and U. Wieder, "Novel architectures for pp applications: the continuous-discrete approach," in Proc. of ACM SPAA, 3. [3] A. Rao, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica, "Load balancing in structured pp systems," in Proc. IPTPS'3, Feb. 3. [4] B. Godfrey, K. Lakshminarayanan, S. Surana, R. Karp, and I. Stoica, "Load balancing in dynamic structured pp systems," in Proc. IEEE INFOCOM'4, Hong Kong, Mar. 4. [5] Y Zhu and Y Hu, "Efficient, proximity-aware load balancing for dhtbased pp systems," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 6, Apr. 5. [6] X. Wang, Y Zhang, X. Li, and D. Loguinov, "On zone-balancing of peer-to-peer networks: Analysis of random node join," in Proc. of ACM SIGMETRICS, 4. [7] F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica., "Widearea cooperative storage with cfs," in Proc. of 8th ACM SOSP,. [8] S. Saroiu, "Measurement and analysis of internet content delivery systems," Doctoral Dissertation, University of Washington, Dec. 4. [9] D. Wu, Y Tian, and K.-W. Ng, "On the effectiveness of migration-based load balancing strategies in dht systems," in CUHK Technical Report, 6. [] N. Christin and J. Chuang, "A cost-based analysis of overlay routing geometries," in Proc. IEEE INFOCOM'5, 5. [] C. Tang, M. J. Buco, R. N. Chang, S. Dwarkadas, L. Z. Luan, E. So, and C. Ward, "Low traffic overlay networks with large routing tables," in Proc. ACM SIGMETRICS'5, 5.

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 8, August 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Structured Peer-to-Peer

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica fananthar, karthik, sonesh, karp, istoicag@cs.berkeley.edu Abstract Most P2P systems

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer

More information

Towards Efficient Load Balancing in Structured P2P Systems

Towards Efficient Load Balancing in Structured P2P Systems Towards Efficient Load Balancing in Structured P2P Systems Yingwu Zhu Department of ECECS University of Cincinnati zhuy@ececs.uc.edu Yiming Hu Department of ECECS University of Cincinnati yhu@ececs.uc.edu

More information

Adaptive Load Balancing for DHT Lookups

Adaptive Load Balancing for DHT Lookups Adaptive Load Balancing for DHT Lookups Silvia Bianchi, Sabina Serbu, Pascal Felber and Peter Kropf University of Neuchâtel, CH-, Neuchâtel, Switzerland {silvia.bianchi, sabina.serbu, pascal.felber, peter.kropf}@unine.ch

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured

More information

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD 1 SHAIK SHAHEENA, 2 SD. AFZAL AHMAD, 3 DR.PRAVEEN SHAM 1 PG SCHOLAR,CSE(CN), QUBA ENGINEERING COLLEGE & TECHNOLOGY, NELLORE 2 ASSOCIATE PROFESSOR, CSE, QUBA ENGINEERING COLLEGE & TECHNOLOGY, NELLORE 3

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Survey on Novel Load Rebalancing for Distributed File Systems

Survey on Novel Load Rebalancing for Distributed File Systems Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

Link Lifetimes and Randomized Neighbor Selection in DHTs

Link Lifetimes and Randomized Neighbor Selection in DHTs Link Lifetimes and Randomized Neighbor Selection in DHTs Zhongmei Yao Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University, College Station, TX 77843

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Applying a diffusive load balancing in a clustered P2P system

Applying a diffusive load balancing in a clustered P2P system Applying a diffusive load balancing in a clustered P2P system Ying Qiao University of Ottawa Ottawa, Canada 1-613-562-5800 yqiao074@site.uottawa.ca Gregor v. Bochmann University of Ottawa Ottawa, Canada

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING

EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING MOHAMMAD H. NADIMI-SHAHRAKI*, FARAMARZ SAFI, ELNAZ SHAFIGH FARD Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

An Adaptive Stabilization Framework for DHT

An Adaptive Stabilization Framework for DHT An Adaptive Stabilization Framework for DHT Gabriel Ghinita, Yong Meng Teo Department of Computer Science National University of Singapore {ghinitag,teoym}@comp.nus.edu.sg Overview Background Related Work

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Plover: A Proactive Low-overhead File Replication Scheme for Structured P2P Systems

Plover: A Proactive Low-overhead File Replication Scheme for Structured P2P Systems : A Proactive Low-overhead File Replication Scheme for Structured P2P Systems Haiying Shen Yingwu Zhu Dept. of Computer Science & Computer Engineering Dept. of Computer Science & Software Engineering University

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

TSP-Chord: An Improved Chord Model with Physical Topology Awareness

TSP-Chord: An Improved Chord Model with Physical Topology Awareness 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore TSP-Chord: An Improved Chord Model with Physical Topology Awareness

More information

Parallel Routing Method in Churn Tolerated Resource Discovery

Parallel Routing Method in Churn Tolerated Resource Discovery in Churn Tolerated Resource Discovery E-mail: emiao_beyond@163.com Xiancai Zhang E-mail: zhangxiancai12@sina.com Peiyi Yu E-mail: ypy02784@163.com Jiabao Wang E-mail: jiabao_1108@163.com Qianqian Zhang

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

COPACC: A Cooperative Proxy-Client Caching System for On-demand Media Streaming

COPACC: A Cooperative Proxy-Client Caching System for On-demand Media Streaming COPACC: A Cooperative - Caching System for On-demand Media Streaming Alan T.S. Ip 1, Jiangchuan Liu 2, and John C.S. Lui 1 1 The Chinese University of Hong Kong, Shatin, N.T., Hong Kong {tsip, cslui}@cse.cuhk.edu.hk

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

A LOAD BALANCING ALGORITHM BASED ON MOVEMENT OF NODE DATA FOR DYNAMIC STRUCTURED P2P SYSTEMS

A LOAD BALANCING ALGORITHM BASED ON MOVEMENT OF NODE DATA FOR DYNAMIC STRUCTURED P2P SYSTEMS A LOAD BALANCING ALGORITHM BASED ON MOVEMENT OF NODE DATA FOR DYNAMIC STRUCTURED P2P SYSTEMS 1 Prof. Prerna Kulkarni, 2 Amey Tawade, 3 Vinit Rane, 4 Ashish Kumar Singh 1 Asst. Professor, 2,3,4 BE Student,

More information

Characterizing Traffic Demand Aware Overlay Routing Network Topologies

Characterizing Traffic Demand Aware Overlay Routing Network Topologies Characterizing Traffic Demand Aware Overlay Routing Network Topologies Benjamin D. McBride Kansas State University Rathbone Hall Manhattan, KS Email: bdm@ksu.edu Caterina Scoglio Kansas State University

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems

Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems H. M. N. Dilum Bandara and Anura P. Jayasumana Colorado State University Anura.Jayasumana@ColoState.edu Contribution Community-aware

More information

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Towards Low-Redundancy Push-Pull P2P Live Streaming

Towards Low-Redundancy Push-Pull P2P Live Streaming Towards Low-Redundancy Push-Pull P2P Live Streaming Zhenjiang Li, Yao Yu, Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Effects of Churn on Structured P2P Overlay Networks

Effects of Churn on Structured P2P Overlay Networks International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks

More information

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi

More information

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Distributed Balanced Tables: Not Making a Hash of it All

Distributed Balanced Tables: Not Making a Hash of it All Distributed Balanced Tables: Not Making a Hash of it All Prasanna Ganesan Mayank Bawa Stanford University fprasanna, bawag@db.stanford.edu Abstract DHTs implement a distributed dictionary, supporting key

More information

Decentralized Approach for Balancing Load in Dynamic Cloud Environment

Decentralized Approach for Balancing Load in Dynamic Cloud Environment Decentralized Approach for Balancing Load in Dynamic Cloud Environment Karthick Smiline Britto.J 1, PrittoPaul.P 2 ME, Department of CSE, Velammal Engineering College, Anna University, Chennai, India 1

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department of Computer Science & Engineering University

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks 1682 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 7, JULY 2014 Community-Aware Opportunistic Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng Huang, Member,

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Efficient Multi-source Data Dissemination in Peer-to-Peer Networks

Efficient Multi-source Data Dissemination in Peer-to-Peer Networks Efficient Multi-source Data Dissemination in Peer-to-Peer Networks Zhenyu Li 1,2, Zengyang Zhu 1,2, Gaogang Xie 1, Zhongcheng Li 1 1 Institute of Computing Technology, Chinese Academy of Sciences 2 Graduate

More information

Congestion Control for Distributed Hash Tables

Congestion Control for Distributed Hash Tables Congestion Control for Distributed Hash Tables Fabius Klemm, Jean-Yves Le Boudec, and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne,

More information

Locality in Structured Peer-to-Peer Networks

Locality in Structured Peer-to-Peer Networks Locality in Structured Peer-to-Peer Networks Ronaldo A. Ferreira Suresh Jagannathan Ananth Grama Department of Computer Sciences Purdue University 25 N. University Street West Lafayette, IN, USA, 4797-266

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables

The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables Cyrus Harvesf and Douglas M. Blough Georgia Institute of Technology School of Electrical and Computer Engineering Atlanta,

More information

Jinho Hwang and Timothy Wood George Washington University

Jinho Hwang and Timothy Wood George Washington University Jinho Hwang and Timothy Wood George Washington University Background: Memory Caching Two orders of magnitude more reads than writes Solution: Deploy memcached hosts to handle the read capacity 6. HTTP

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

Shaking Service Requests in Peer-to-Peer Video Systems

Shaking Service Requests in Peer-to-Peer Video Systems Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

6 Distributed data management I Hashing

6 Distributed data management I Hashing 6 Distributed data management I Hashing There are two major approaches for the management of data in distributed systems: hashing and caching. The hashing approach tries to minimize the use of communication

More information

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems

More information

Providing File Services using a Distributed Hash Table

Providing File Services using a Distributed Hash Table Providing File Services using a Distributed Hash Table Lars Seipel, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany lars.seipel@stud.h-da.de

More information

Minimizing Churn in Distributed Systems

Minimizing Churn in Distributed Systems Minimizing Churn in Distributed Systems by P. Brighten Godfrey, Scott Shenker, and Ion Stoica appearing in SIGCOMM 2006 presented by Todd Sproull Introduction Problem: nodes joining or leaving distributed

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

726 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009

726 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 726 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks Xiaoming Wang, Student Member, IEEE, Zhongmei Yao, Student Member,

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks

Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Mathieu Bouet, Julien Boite, Jérémie Leguay and Vania Conan Thales Communications & Security, Paris, France Abstract

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Locality-Aware and Churn-Resilient Load Balancing Algorithms in Structured Peer-to-Peer Networks

Locality-Aware and Churn-Resilient Load Balancing Algorithms in Structured Peer-to-Peer Networks 1 Locality-Aware and Churn-Resilient Load Balancing Algorithms in Structured Peer-to-Peer Networks Haiying Shen Cheng-Zhong Xu Dept. of Computer Science and Engineering Dept. of Electrical & Computer Engineering

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Experimental Study of Parallel Downloading Schemes for Internet Mirror Sites

Experimental Study of Parallel Downloading Schemes for Internet Mirror Sites Experimental Study of Parallel Downloading Schemes for Internet Mirror Sites Spiro Philopoulos Dept. of Elect. and Comp. Eng. University of Manitoba Winnipeg, Canada email: umphilop@cc.umanitoba.ca Muthucumaru

More information

FPN: A Distributed Hash Table for Commercial Applications

FPN: A Distributed Hash Table for Commercial Applications FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Understanding Disconnection and Stabilization of Chord

Understanding Disconnection and Stabilization of Chord Understanding Disconnection and Stabilization of Chord Zhongmei Yao Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University, College Station, TX 77843

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic

Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic Chandan Rama Reddy Microsoft Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer

More information

Flash Crowd Handling in P2P Live Video Streaming Systems

Flash Crowd Handling in P2P Live Video Streaming Systems Flash Crowd Handling in P2P Live Video Streaming Systems Anurag Dwivedi, Sateesh Awasthi, Ashutosh Singh, Y. N. Singh Electrical Engineering, IIT Kanpur Abstract An interesting and challenging phenomenon

More information

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign Securing Chord for ShadowWalker Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign tiku1@illinois.edu ABSTRACT Peer to Peer anonymous communication promises to eliminate

More information

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information